Verifiable Functional Encryption
暂无分享,去创建一个
Amit Sahai | Vipul Goyal | Aayush Jain | Saikrishna Badrinarayanan | A. Sahai | Vipul Goyal | Aayush Jain | S. Badrinarayanan
[1] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[2] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[3] Nir Bitansky,et al. Indistinguishability Obfuscation from Functional Encryption , 2018, J. ACM.
[4] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[5] Craig Gentry,et al. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits , 2014, EUROCRYPT.
[6] Vinod Vaikuntanathan,et al. Predicate Encryption for Circuits from LWE , 2015, CRYPTO.
[7] Rafail Ostrovsky,et al. Non-interactive Zaps and New Techniques for NIZK , 2006, CRYPTO.
[8] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[9] Vipul Goyal,et al. Multi-input Functional Encryption with Unbounded-Message Security , 2015, ASIACRYPT.
[10] Adam O'Neill,et al. Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..
[11] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[12] Katsuyuki Takashima,et al. Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption , 2020, SCN.
[13] Manuel Barbosa,et al. Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation , 2012, CT-RSA.
[14] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[15] Vinod Vaikuntanathan,et al. Attribute-based encryption for circuits , 2013, STOC '13.
[16] Amit Sahai,et al. Worry-free encryption: functional encryption with public keys , 2010, CCS '10.
[17] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[18] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[19] Vinod Vaikuntanathan,et al. Functional Encryption: New Perspectives and Lower Bounds , 2013, IACR Cryptol. ePrint Arch..
[20] Brent Waters,et al. Black-box accountable authority identity-based encryption , 2008, CCS.
[21] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[24] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[25] Amit Sahai,et al. Multi-input Functional Encryption for Unbounded Arity Functions , 2015, ASIACRYPT.
[26] Abhishek Jain,et al. Indistinguishability Obfuscation from Compact Functional Encryption , 2015, CRYPTO.
[27] Amit Sahai,et al. A note on VRFs from Verifiable Functional Encryption , 2017, IACR Cryptol. ePrint Arch..
[28] Salil P. Vadhan,et al. Derandomization in Cryptography , 2007, SIAM J. Comput..
[29] Hoeteck Wee,et al. Multi-input Inner-Product Functional Encryption from Pairings , 2017, EUROCRYPT.
[30] Moti Yung,et al. Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions , 2016, ICALP.
[31] Amit Sahai,et al. Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results , 2013, IACR Cryptol. ePrint Arch..
[32] Amit Sahai,et al. Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption , 2015, IACR Cryptol. ePrint Arch..
[33] Vinod Vaikuntanathan,et al. Functional Encryption with Bounded Collusions via Multi-party Computation , 2012, CRYPTO.
[34] Nir Bitansky,et al. ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation , 2015, TCC.
[35] Parampalli Udaya,et al. E cient Identity-based Signcryption without Random Oracles , 2012, AISC.
[36] Amit Sahai,et al. Fully Secure Accountable-Authority Identity-Based Encryption , 2011, Public Key Cryptography.